🚀 Call for Papers – DeMeSSAI 2025! 🚀 We’re excited to announce that the 4th International Workshop on Designing and Measuring Security in Systems (DeMeSSAI 2025) will take place on July 4th, 2025, co-located with the 10th IEEE EuroS&P 2025. As part of the Sec4AI4Sec project, we will present key activities and goals at the workshop, covering two critical topic areas: 🔹 Sec4AI – Security for AI 🔹 AI4Sec – AI for Security This is a great opportunity for researchers and practitioners to contribute, exchange ideas, and push the boundaries of AI and security! 📝 Submission Deadline: February 20, 2025 🌍 Learn more & submit your work: https://lnkd.in/d9vVbKfJ 🔹 Workshop Chairs: Katja Tuma – Vrije Universiteit Amsterdam, Netherlands Jamal El Hachem , University of Southern Brittany, France Maura Pintor – University of Cagliari, Italy Fabio Massacci – Vrije Universiteit Amsterdam & University of Trento, Netherlands/Italy Koen Yskout , Katholieke Universiteit Leuven (KU), Belgium Mehdi Mirakhorli , University of Hawaii, USA Join us in shaping the future of secure AI systems! 💡🔒 #AI #CyberSecurity #Sec4AI4Sec #DeMeSSAI2025 #SecurityResearch
Sec4AI4Sec’s Post
More Relevant Posts
-
OpenAI Unveils Secure AI Model Training Infrastructure OpenAI has unveiled its infrastructure architecture designed to safely train advanced AI models. OpenAI, an artificial intelligence research group, unveiled its research infrastructure architecture to enable the safe training of sophisticated AI models. OpenAI, which prioritizes security while focusing on expanding the field of AI research, operates the largest AI training supercomputer. Protecting sensitive assets, […] OpenAI Unveils Secure AI Model Training Infrastructure #AIModel #Aitechnology #Artificialintelligence
To view or add a comment, sign in
-
NVIDIA AI Blueprints are workflows for agentic and generative AI. In this episode, Gregor Vand talks to Allan Enemark and Amanda Saunders about the Blueprint for agentic AI container vulnerability analysis. Listen here: https://lnkd.in/gzywsuVm
To view or add a comment, sign in
-
Diving into NVIDIA AI Blueprints that provide customizable recipes to help developers get started building AI agents. Allan Enemark and I got to go deep into our latest AI Blueprint on vulnerability analysis for container security and talk about how the open reference workflows get people started faster. #generativeAI #AIagents #AIBlueprints
NVIDIA AI Blueprints are workflows for agentic and generative AI. In this episode, Gregor Vand talks to Allan Enemark and Amanda Saunders about the Blueprint for agentic AI container vulnerability analysis. Listen here: https://lnkd.in/gzywsuVm
To view or add a comment, sign in
-
5 Ways Generative AI is Transforming the Technology Industry Generative AI is ushering in a new era for the technology sector by boosting productivity in critical areas, such as software development and UI prototyping. Beyond time savings, generative AI is having strategic impacts, including reducing cybersecurity threats and enabling cutting-edge research. In our latest article, Sarah Hoffman explores 5 transformative ways generative AI is reshaping the industry. https://lnkd.in/eDpNRz6v
To view or add a comment, sign in
-
Ready to explore the impact of AI in cybersecurity? Our DevSecOps and Generative AI event is going virtual on June 18! Join us to learn how to harness the power of AI to fortify your security posture. https://bit.ly/4dKIZnt Whether you're looking to relive the action from our in-person event at RSAC or want to be part of our new, immersive virtual experience, featuring fresh insights and exclusive virtual-only sessions, this is your chance to navigate the evolving #cybersecurity landscape and dive into the intersection of #DevSecOps and #GenerativeAI. At DevSecOps and Generative AI Virtual on June 18, we'll explore: 🚀 The impact of AI in DevSecOps 🚀 How to deploy AI safely 🚀 Emerging AI security government requirements 🚀 How AI is changing the cybersecurity testing landscape 🚀 How to scale security programs using LLMs 🚀 The challenges, pitfalls, biases and vulnerabilities that AI systems introduce 🚀 And more! Join us to catch up on what you missed, attend new, virtual-only breakout sessions and network with fellow DevSecOps and #AI professionals. Register now for free to save your spot! https://bit.ly/4dKIZnt
To view or add a comment, sign in
-
𝘋𝘰 𝘺𝘰𝘶 𝘸𝘢𝘯𝘵 𝘵𝘰 𝘬𝘯𝘰𝘸 𝘮𝘰𝘳𝘦 𝘢𝘣𝘰𝘶𝘵 𝘩𝘰𝘸 𝘤𝘰𝘮𝘱𝘶𝘵𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘥𝘦𝘴𝘪𝘨𝘯 𝘴𝘤𝘪𝘦𝘯𝘤𝘦 𝘤𝘢𝘯 𝘣𝘦 𝘶𝘴𝘦𝘥 𝘵𝘰 𝘥𝘦𝘴𝘪𝘨𝘯 𝘢𝘯 𝘦𝘧𝘧𝘦𝘤𝘵𝘪𝘷𝘦 𝘵𝘩𝘳𝘦𝘢𝘵-𝘩𝘶𝘯𝘵𝘪𝘯𝘨 𝘮𝘦𝘤𝘩𝘢𝘯𝘪𝘴𝘮 𝘪𝘯 𝘤𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺? Our latest research article, "𝘋𝘦𝘦𝘱𝘚𝘦𝘤𝘶𝘳𝘦: 𝘈 𝘊𝘰𝘮𝘱𝘶𝘵𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘋𝘦𝘴𝘪𝘨𝘯 𝘚𝘤𝘪𝘦𝘯𝘤𝘦 𝘈𝘱𝘱𝘳𝘰𝘢𝘤𝘩 𝘧𝘰𝘳 𝘐𝘯𝘵𝘦𝘳𝘱𝘳𝘦𝘵𝘢𝘣𝘭𝘦 𝘛𝘩𝘳𝘦𝘢𝘵 𝘏𝘶𝘯𝘵𝘪𝘯𝘨 𝘪𝘯 𝘊𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘋𝘦𝘤𝘪𝘴𝘪𝘰𝘯 𝘔𝘢𝘬𝘪𝘯𝘨," has just been published as open access in 𝐃𝐞𝐜𝐢𝐬𝐢𝐨𝐧 𝐒𝐮𝐩𝐩𝐨𝐫𝐭 𝐒𝐲𝐬𝐭𝐞𝐦𝐬 (JUFO-3, IF: 6.7, AIS Basket 11 Journal)! Congratulations !!!! to all co-authors Najmul Islam Danish Javeed, Ph.D.Xin (Robert) Luo In this work, we adopt the 𝐜𝐨𝐦𝐩𝐮𝐭𝐚𝐭𝐢𝐨𝐧𝐚𝐥 𝐝𝐞𝐬𝐢𝐠𝐧 𝐬𝐜𝐢𝐞𝐧𝐜𝐞 paradigm to develop a novel IT artifact for advanced threat-hunting—DeepSecure. Here are some of our key contributions: 🔹 𝐃𝐲𝐧𝐚𝐦𝐢𝐜 𝐕𝐞𝐜𝐭𝐨𝐫 𝐐𝐮𝐚𝐧𝐭𝐢𝐳𝐞𝐝 𝐕𝐚𝐫𝐢𝐚𝐭𝐢𝐨𝐧𝐚𝐥 𝐀𝐮𝐭𝐨𝐞𝐧𝐜𝐨𝐝𝐞𝐫 𝐓𝐞𝐜𝐡𝐧𝐢𝐪𝐮𝐞: A novel pattern extraction technique for multivariate time series datasets. 🔹 𝐌𝐮𝐥𝐭𝐢𝐬𝐜𝐚𝐥𝐞 𝐇𝐢𝐞𝐫𝐚𝐫𝐜𝐡𝐢𝐜𝐚𝐥 𝐀𝐭𝐭𝐞𝐧𝐭𝐢𝐨𝐧 𝐁𝐢𝐆𝐑𝐔 𝐌𝐨𝐝𝐞𝐥: A robust threat-hunting mechanism designed to handle evolving cyber threats. 🔹 𝐈𝐧𝐭𝐞𝐫𝐩𝐫𝐞𝐭𝐚𝐛𝐢𝐥𝐢𝐭𝐲: We visualize attention scores to offer transparency, helping practitioners gain valuable insights into model decisions. This work was supported by the Research Council of Finland | Suomen Akatemia with CHIST-ERA, grant agreement no - 359790, Di4SPDS-Distributed Intelligence for Enhancing Security and Privacy of Decentralized and Distributed Systems. #cybersecurity #DesignScience #ComputationalDesignScience #threathunting #deeplearning #AI #DecisionSupportSystems #cyberthreats #openaccess #Chistera #LUTSoftware Check out the full article here: https://lnkd.in/dnu9hMdN
To view or add a comment, sign in
-
𝘋𝘰 𝘺𝘰𝘶 𝘸𝘢𝘯𝘵 𝘵𝘰 𝘬𝘯𝘰𝘸 𝘮𝘰𝘳𝘦 𝘢𝘣𝘰𝘶𝘵 𝘩𝘰𝘸 𝘤𝘰𝘮𝘱𝘶𝘵𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘥𝘦𝘴𝘪𝘨𝘯 𝘴𝘤𝘪𝘦𝘯𝘤𝘦 𝘤𝘢𝘯 𝘣𝘦 𝘶𝘴𝘦𝘥 𝘵𝘰 𝘥𝘦𝘴𝘪𝘨𝘯 𝘢𝘯 𝘦𝘧𝘧𝘦𝘤𝘵𝘪𝘷𝘦 𝘵𝘩𝘳𝘦𝘢𝘵-𝘩𝘶𝘯𝘵𝘪𝘯𝘨 𝘮𝘦𝘤𝘩𝘢𝘯𝘪𝘴𝘮 𝘪𝘯 𝘤𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺? Our latest research article, "𝘋𝘦𝘦𝘱𝘚𝘦𝘤𝘶𝘳𝘦: 𝘈 𝘊𝘰𝘮𝘱𝘶𝘵𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘋𝘦𝘴𝘪𝘨𝘯 𝘚𝘤𝘪𝘦𝘯𝘤𝘦 𝘈𝘱𝘱𝘳𝘰𝘢𝘤𝘩 𝘧𝘰𝘳 𝘐𝘯𝘵𝘦𝘳𝘱𝘳𝘦𝘵𝘢𝘣𝘭𝘦 𝘛𝘩𝘳𝘦𝘢𝘵 𝘏𝘶𝘯𝘵𝘪𝘯𝘨 𝘪𝘯 𝘊𝘺𝘣𝘦𝘳𝘴𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘋𝘦𝘤𝘪𝘴𝘪𝘰𝘯 𝘔𝘢𝘬𝘪𝘯𝘨," has just been published as open access in 𝐃𝐞𝐜𝐢𝐬𝐢𝐨𝐧 𝐒𝐮𝐩𝐩𝐨𝐫𝐭 𝐒𝐲𝐬𝐭𝐞𝐦𝐬 (JUFO-3, IF: 6.7, AIS Basket 11 Journal)! Congratulations !!!! to Dr. Prabhat Kumar and coauthors , Najmul Islam and Xin (Robert) Luo In this work, we adopt the 𝐜𝐨𝐦𝐩𝐮𝐭𝐚𝐭𝐢𝐨𝐧𝐚𝐥 𝐝𝐞𝐬𝐢𝐠𝐧 𝐬𝐜𝐢𝐞𝐧𝐜𝐞 paradigm to develop a novel IT artifact for advanced threat-hunting—DeepSecure. Here are some of our key contributions: 🔹 𝐃𝐲𝐧𝐚𝐦𝐢𝐜 𝐕𝐞𝐜𝐭𝐨𝐫 𝐐𝐮𝐚𝐧𝐭𝐢𝐳𝐞𝐝 𝐕𝐚𝐫𝐢𝐚𝐭𝐢𝐨𝐧𝐚𝐥 𝐀𝐮𝐭𝐨𝐞𝐧𝐜𝐨𝐝𝐞𝐫 𝐓𝐞𝐜𝐡𝐧𝐢𝐪𝐮𝐞: A novel pattern extraction technique for multivariate time series datasets. 🔹 𝐌𝐮𝐥𝐭𝐢𝐬𝐜𝐚𝐥𝐞 𝐇𝐢𝐞𝐫𝐚𝐫𝐜𝐡𝐢𝐜𝐚𝐥 𝐀𝐭𝐭𝐞𝐧𝐭𝐢𝐨𝐧 𝐁𝐢𝐆𝐑𝐔 𝐌𝐨𝐝𝐞𝐥: A robust threat-hunting mechanism designed to handle evolving cyber threats. 🔹 𝐈𝐧𝐭𝐞𝐫𝐩𝐫𝐞𝐭𝐚𝐛𝐢𝐥𝐢𝐭𝐲: We visualize attention scores to offer transparency, helping practitioners gain valuable insights into model decisions. This work was supported by the Research Council of Finland | Suomen Akatemia with CHIST-ERA, grant agreement no - 359790, Di4SPDS-Distributed Intelligence for Enhancing Security and Privacy of Decentralized and Distributed Systems. #cybersecurity #DesignScience #ComputationalDesignScience #threathunting #deeplearning #AI #DecisionSupportSystems #cyberthreats #openaccess #Chistera #LUTSoftware Check out the full article here:
To view or add a comment, sign in
-
I'm thrilled to introduce the Bandit Network (BN)— a secure, AI-enhanced networking system that I've been hard at work on! 🔧 Built by: Wayne Sletcher (aka SledgeHumma on Discord and banditofsmoke on GitHub), BN is a showcase of innovative architecture and advanced security features. Technical Highlights 🌐 🔸 7-Layered Architecture: Inspired by the OSI model, with custom implementations across all layers—physical, data link, network, transport, session, presentation, and application. 🔸 AI-Driven Routing: Intelligent routing protocols powered by machine learning for optimized network performance. 🔸 End-to-End Encryption: Secure data transmission with AES-256-GCM encryption and HMAC-SHA256 integrity verification. 🔸 Modular Design: Extensible and built using Python and asyncio for efficient asynchronous processing. 🔸 Sandboxed AI Execution: Secure, isolated environment for AI agents with built-in timeout mechanisms and anomaly detection. 💡 Why GDN Stands Out 🔒 Multi-layered Security: State-of-the-art encryption and integrity verification techniques. 🤖 AI-Powered Processing: Advanced AI capabilities for real-time data analysis and automated decision-making. 🌐 Scalable Architecture: Designed to support global, distributed networks with seamless node communication. 🛠️ Modular & Extensible: Future-proof, allowing easy integration of new technologies. 👥 Collaborative Potential: Perfect for secure business communications, scientific research networks, and privacy-focused social platforms. Let's Connect! If you're as passionate as I am about the intersection of cybersecurity, AI, and distributed systems, let's chat about the future of secure, intelligent networks! #Cybersecurity #ArtificialIntelligence #DistributedSystems #Innovation #TechForGood
To view or add a comment, sign in
-
Learn how to protect your AI systems with secure design principles on the blog.
To view or add a comment, sign in
-
3 AI Strategies for Cybersecurity and Observability As organizations embrace dispersed architecture, grapple with an evolving threat landscape and heavily rely on digital systems, AI steps in as a promising solution to control IT chaos. But without clear guardrails that address data privacy and security concerns, we must determine how to build AI models that ...
To view or add a comment, sign in
Cefriel USI Università della Svizzera italiana FrontEndART Software Ltd. SAP Pluribus One Thales Vrije Universiteit Amsterdam (VU Amsterdam), UniTrento DISI Hamburg University of Technology Università degli Studi di Cagliari